- published: 07 May 2012
- views: 57
- author: MeeksMixedMedia
31:23
Old Wide Web Episode 6 -- The Jargon File
Just when you least expected it... a game show! See how well you know classic Internet jar...
published: 07 May 2012
author: MeeksMixedMedia
Old Wide Web Episode 6 -- The Jargon File
Just when you least expected it... a game show! See how well you know classic Internet jargon. This is an archived version of the Old Wide Web podcast produced by Meeks Mixed Media in 2011.
- published: 07 May 2012
- views: 57
- author: MeeksMixedMedia
1:55
NETNANNY 4.0 - Jargon-1
Jargon File Archive Each file is provided in both CR/LF text compressed with Zip and LF te...
published: 21 Apr 2012
author: nattymari
NETNANNY 4.0 - Jargon-1
Jargon File Archive Each file is provided in both CR/LF text compressed with Zip and LF text compressed with Gzip. Version# EOL/Ext Size EOL/Ext Size Notes 1.x versions were retroactively numbered, less than systematically. 1.0.3 - DOS Zip 12k Unix gz 11k Earliest version found. 1.0.4 - DOS Zip 24k Unix gz 23k 1.0.5 - DOS Zip 29k Unix gz 28k 1.1.0 - DOS Zip 33k Unix gz 33k ESR number. 1.1.2 - DOS Zip 34k Unix gz 34k 1.1.3 - DOS Zip 35k Unix gz 35k 1.1.5 - DOS Zip 36k Unix gz 36k 1.2.0 - DOS Zip 36k Unix gz 36k ESR number. 1.3.0 - ESR number. Same text as 1.2.0. 1.4.0 - DOS Zip 39k Unix gz 38k ESR number. 1.5.0 - DOS Zip 92k Unix gz 91k Text of The Hacker's Dictionary. ESR number. Beginning of the modern-era Jargon File 2.1.1 - DOS Zip 116k Unix gz 115k First ESR revision. 2.1.2 - Missing! 2.1.3 - Missing! 2.1.4 - Missing! 2.1.5 - DOS Zip 130k Unix gz 129k 2.2.1 - DOS Zip 203k Unix gz 202k 2.3.1 - DOS Zip 226k Unix gz 224k 2.4.1 - DOS Zip 258k Unix gz 257k 2.4.2 - Missing! 2.4.3 - DOS Zip 284k Unix gz 282k 2.4.4 - DOS Zip 286k Unix gz 284k 2.5.1 - DOS Zip 295k Unix gz 293k 2.6.1 - DOS Zip 311k Unix gz 309k 2.6.2 - DOS Zip 311k Unix gz 309k 2.6.3 - DOS Zip 312k Unix gz 310k 2.7.1 - DOS Zip 332k Unix gz 330k 2.8.1 - DOS Zip 356k Unix gz 354k 2.8.2 - DOS Zip 357k Unix gz 354k 2.8.3 - DOS Zip 358k Unix gz 356k 2.9.1 - Missing! 2.9.2 - Missing! 2.9.3 - Missing! 2.9.4 - Missing! 2.9.5 - Missing! 2.9.6 - DOS Zip 390k Unix gz 387k Text of The New Hacker's Dictionary, first edition ...
- published: 21 Apr 2012
- views: 171
- author: nattymari
1:11
Jargon (Videohive After Effects templates files)
Download link: videohive.net...
published: 27 Nov 2012
author: Inge Swann
Jargon (Videohive After Effects templates files)
Download link: videohive.net
- published: 27 Nov 2012
- views: 77
- author: Inge Swann
4:47
geeks chicks and suicide girls
SuicideGirls es una página web de pornografía softcore altporn cuyas modelos tienen un per...
published: 02 Oct 2011
author: TheRavesrocker
geeks chicks and suicide girls
SuicideGirls es una página web de pornografía softcore altporn cuyas modelos tienen un perfil gótico o punk. También funciona como una comunidad virtual donde se publican anuncios y perfiles de sus miembros, además de entrevistas con personajes del mundo de la cultura alternativa. El discurso de la empresa hace uso de una retórica pro-feminista y dice promocionar una forma de poder de la mujer a través del control de su sexualidad. Acceder a gran parte de ésta página requiere un registro y es de pago. El término altporn (porno alternativo) ha sido utilizado dentro de los medios y en Internet para describir el estilo de erotismo ofrecido por ésta página y otras similares que han proliferado posteriormente. El término «geek» en español está relacionado sólo con la tecnología, a diferencia del uso del término geek en inglés, que tiene un significado más amplio y equivalente al término español frikiEl desarrollo -y el significado exacto- del término no es el mismo en todos los ámbitos, ni culturas,4 aunque sí ha mantenido la acepción de friki. Es un término originariamente anglosajón y, según el glosario de argot hacker «Jargon File», en sus inicios parece ser que se refería a un fanático de un personaje de carnaval que «arrancaba la cabeza de los pollosAntes de 1990 era de connotación más bien peyorativa. Si bien hoy en día no es así, las primeras versiones del término definían a un geek del ordenador con algunos de los conceptos que se podían englobar en: un pardillo, un ...
- published: 02 Oct 2011
- views: 410
- author: TheRavesrocker
5:25
Tamper-proof digital files
~~Counterfeit deterrence of sensitive or secure deocuments of value~~~ The captions (annot...
published: 27 Aug 2009
author: encryptionalgorithm
Tamper-proof digital files
~~Counterfeit deterrence of sensitive or secure deocuments of value~~~ The captions (annotations) were made in a simple language, away from any technical jargon since this video was presented in the form of a demo to secondary school pupils as a motivation to pursue science fields. The video describes a special case of information hiding that is known as self-embedding. In essence, the process embeds a copy of the media into itself, of course it goes without saying that the copy has to be encrypted before the embedding takes place.
- published: 27 Aug 2009
- views: 1181
- author: encryptionalgorithm
4:15
come impallare o bloccare e poi spengere pc automaticamente
falso virus inventato da me che permette non solo di impallare il computer ma anche di spe...
published: 09 Jul 2009
author: virus2373
come impallare o bloccare e poi spengere pc automaticamente
falso virus inventato da me che permette non solo di impallare il computer ma anche di spegnerlo automaticamente sempre con un semplicissimo file .bat
- published: 09 Jul 2009
- views: 315
- author: virus2373
4:11
come impallare un pc con un file .bat
spiegazione + dimostrazione di come impallare o bloccare un pc con un file in formato .bat...
published: 09 Jul 2009
author: virus2373
come impallare un pc con un file .bat
spiegazione + dimostrazione di come impallare o bloccare un pc con un file in formato .bat.....SO CHE LO SAPETE MA IO VE LO APPROFONDISCO!!
- published: 09 Jul 2009
- views: 495
- author: virus2373
61:20
3. Iterative deletion and the median-voter theorem
Game Theory (ECON 159) We apply the main idea from last time, iterative deletion of domina...
published: 20 Nov 2008
author: YaleCourses
3. Iterative deletion and the median-voter theorem
Game Theory (ECON 159) We apply the main idea from last time, iterative deletion of dominated strategies, to analyze an election where candidates can choose their policy positions. We then consider how good is this classic model as a description of the real political process, and how we might build on it to improve it. Toward the end of the class, we introduce a new idea to get us beyond iterative deletion. We think about our beliefs about what the other player is going to do, and then ask what is the best strategy for us to choose given those beliefs? 00:00 - Chapter 1. Iterative Deletion of Dominated Strategies: The Median Voter Theorem 27:25 - Chapter 2. Iterative Deletion of Dominated Strategies: Problems with The Median Voter Theorem 35:07 - Chapter 3. Iterative Deletion of Dominated Strategies: Robustness of The Median Voter Theorem 39:11 - Chapter 4. Best Response Complete course materials are available at the Open Yale Courses website: open.yale.edu This course was recorded in Fall 2007.
- published: 20 Nov 2008
- views: 37174
- author: YaleCourses
3:26
Jason Derulo - "It Girl" [COVER Video] ONFIRE ft. Tommy C, Jargon, Erin Paula and MORE!!!
All rights reserved to original artist and Beluga Heights/Warner Bros. Yo the homies came ...
published: 27 Sep 2011
author: onfireenttv
Jason Derulo - "It Girl" [COVER Video] ONFIRE ft. Tommy C, Jargon, Erin Paula and MORE!!!
All rights reserved to original artist and Beluga Heights/Warner Bros. Yo the homies came into Seattle for the Reign 3 concert and we decided to get some work done! Check out all the special guest cameos!! haha. Support everyone who made this video happen! Video Editing: Tommy C (www.youtube.com Shot by: J. Reyez (www.youtube.com Artists: Hook: Tommy C (www.youtube.com Verse 1: Jargon (www.youtube.com Verse 2: L-Dubs (www.youtube.com Verse 3: LOE (www.youtube.com [DOWNLOAD LINK] www.zshare.net [LYRICS] Tommy C: (@IBUTOMMY) You could be my it girl Baby you're the shit girl Lovin' you could be a crime Crazy how we fit girl This is it girl Give me 25 to life I just wanna rock all night long And put you in the middle of my spotlight You could be my it girl You're my biggest hit girl Let me play it loud Let me play it loud like... oh oh oh oh Let me play it loud Let me play it loud like... oh oh oh oh Let me play it loud JARGON: (@Jargondyonosis) I don't wanna go home with you, I wanna wake up with you N maybe share a couple vows I wanna take up with you Spend a whole day just to lay up with you And get you mad for a minute just to make up with you For your love I'll go dumb shawty, retard Cuz you're my IT girl, no Geek Squad Used to think my heart need a recharge But now its all access no keycard So it'll be, a little more history If 'it' and me, could take off to It-aly Cuz that, 'it' is you, and it's fit to be N if I cant have that, than its it for me Peace! L-Dubs ...
- published: 27 Sep 2011
- views: 215026
- author: onfireenttv
18:23
Chromosomes, Chromatids, Chromatin, etc.
Learn more: www.khanacademy.org The vocabulary of DNA: chromosomes, chromatids, chromatin,...
published: 23 Sep 2009
author: khanacademy
Chromosomes, Chromatids, Chromatin, etc.
Learn more: www.khanacademy.org The vocabulary of DNA: chromosomes, chromatids, chromatin, transcription, translation, and replication
- published: 23 Sep 2009
- views: 406640
- author: khanacademy
4:31
Backing Up Your Files with Ian Green
Ian Green makes is sometimes made out to be a confusing task simple. He explains why, when...
published: 07 Jan 2010
author: jargonfreehelp
Backing Up Your Files with Ian Green
Ian Green makes is sometimes made out to be a confusing task simple. He explains why, when and where you should backup.
- published: 07 Jan 2010
- views: 37
- author: jargonfreehelp
72:05
4. Best responses in soccer and business partnerships
Game Theory (ECON 159) We continue the idea (from last time) of playing a best response to...
published: 20 Nov 2008
author: YaleCourses
4. Best responses in soccer and business partnerships
Game Theory (ECON 159) We continue the idea (from last time) of playing a best response to what we believe others will do. More particularly, we develop the idea that you should not play a strategy that is not a best response for any belief about others' choices. We use this idea to analyze taking a penalty kick in soccer. Then we use it to analyze a profit-sharing partnership. Toward the end, we introduce a new notion: Nash Equilibrium. 00:00 - Chapter 1. Best Response: Penalty Kicks in Soccer 15:14 - Chapter 2. Best Response: Issues with the Penalty Kick Model 24:06 - Chapter 3. Best Response: Formal Definition 29:59 - Chapter 4. Externalities and Inefficient Outcomes: The Partnership Game 01:07:23 - Chapter 5. Nash Equilibrium: Preview Complete course materials are available at the Open Yale Courses website: open.yale.edu This course was recorded in Fall 2007.
- published: 20 Nov 2008
- views: 35837
- author: YaleCourses
70:45
10. Debt Markets: Term Structure
Financial Markets (ECON 252) The markets for debt, both public and private far exceed the ...
published: 20 Nov 2008
author: YaleCourses
10. Debt Markets: Term Structure
Financial Markets (ECON 252) The markets for debt, both public and private far exceed the entire stock market in value and importance. The US Treasury issues debt of various maturities through auctions, which are open only to authorized buyers. Corporations issue debt with investment banks as intermediaries. The interest rates are not set by the Treasury, the corporations or the investment bankers, but are determined by the market, reflecting economic forces about which there are a number of theories. The real and nominal rates and the coupons of a bond determine its price in the market. The term structure, which is the plot of yield-to-maturity against time-to-maturity indicates the value of time for points in the future. Forward rates are the future spot rates that can be calculated using today's bond prices. Finally, indexed bonds, which are indexed to inflation, offer the safest asset of all and their price reveals a fundamental economic indicator, the real interest rate. 00:00 - Chapter 1. Introduction 04:25 - Chapter 2. The Discount and Investment Rates 19:12 - Chapter 3. The Bid-Ask Spread and Murdoch's Wall Street Journal 29:17 - Chapter 4. Defining Bonds and the Pricing Formula 39:38 - Chapter 5. Derivation of the Term Structure of Interest Rates 52:34 - Chapter 6. Lord John Hicks's Forward Rates: Derivation and Calculations 01:06:09 - Chapter 7. Inflation and Interest Rates Complete course materials are available at the Open Yale Courses website: open.yale.edu ...
- published: 20 Nov 2008
- views: 30889
- author: YaleCourses
0:31
National Car Rental Commercial 2012 - Improve ROI through SEO by COB
National Car Rental commercial featuring business pro Lindsay, as she enjoys the benefits ...
published: 23 Mar 2012
author: NationalCarRent
National Car Rental Commercial 2012 - Improve ROI through SEO by COB
National Car Rental commercial featuring business pro Lindsay, as she enjoys the benefits of Emerald Club membership and chooses a rental car from the Emerald Aisle. [Voice-over] You are a Business Pro. Monarch of Marketing Analysis. With the ability to improve ROI through SEO all by COB. And you rent from National. Because only National lets you choose any car in the aisle and go. You can even take a full-size or above, and still pay the mid-size price. [Lindsay] I'm going BIG. [Voice-over] Good Choice Business Pro. Good Choice. Go National! Go Like a Pro! www.NationalCar.com http www.Twitter.com
- published: 23 Mar 2012
- views: 10471
- author: NationalCarRent
Youtube results:
53:31
Leadership in Context: Transforming the FBI in an Uncertain World
FBI Director Robert Mueller assumed his role on September 4, 2001, only a week before the ...
published: 13 Oct 2009
author: stanfordbusiness
Leadership in Context: Transforming the FBI in an Uncertain World
FBI Director Robert Mueller assumed his role on September 4, 2001, only a week before the 9/11 attack. In his talk, he discussed efforts to radically change the focus and mindset at the FBI following the attacks, shifting from a reactive stance to one that prevents such events from occurring in the future. He discussed the shift in priorities immediately following 9/11, as well as leadership efforts in the years since to solidify and improve upon those initial changes. He talks about the challenges of running a large government agency, and some leadership lessons he has found to be useful for those managing in any large organization. The event was sponsored by the Stanford GSB's Center for Leadership Development and Research (CLDR) and the Public Management Program (PMP), as well as the Stanford Law School. Recorded: October 8, 2009 GSB's Center for Leadership Development and Research: www.gsb.stanford.edu GSB's Public Management Program: csi.gsb.stanford.edu Stanford Law School: law.stanford.edu All videos from the View from the Top speaker series www.youtube.com
- published: 13 Oct 2009
- views: 7268
- author: stanfordbusiness
72:06
6. Nash equilibrium: dating and Cournot
Game Theory (ECON 159) We apply the notion of Nash Equilibrium, first, to some more coordi...
published: 21 Nov 2008
author: YaleCourses
6. Nash equilibrium: dating and Cournot
Game Theory (ECON 159) We apply the notion of Nash Equilibrium, first, to some more coordination games; in particular, the Battle of the Sexes. Then we analyze the classic Cournot model of imperfect competition between firms. We consider the difficulties in colluding in such settings, and we discuss the welfare consequences of the Cournot equilibrium as compared to monopoly and perfect competition. 00:00 - Chapter 1. Coordination Games: Scope for Leadership and Strategic Complements 04:59 - Chapter 2. Coordination Games: The Battle of the Sexes 18:37 - Chapter 3. Cournot Duopoly: Math 53:28 - Chapter 4. Cournot Duopoly: Real World Examples Complete course materials are available at the Open Yale Courses website: open.yale.edu This course was recorded in Fall 2007.
- published: 21 Nov 2008
- views: 62906
- author: YaleCourses
104:08
SIMS 141 - Overview of How Search Engines Work
Search Engines: Technology, Society, and Business. The World Wide Web brings much of the w...
published: 26 Jan 2008
author: UCBerkeley
SIMS 141 - Overview of How Search Engines Work
Search Engines: Technology, Society, and Business. The World Wide Web brings much of the world's knowledge into the reach of nearly everyone with a computer and an internet connection. The availability of huge quantities of information at our fingertips is transforming government, business, and many other aspects of society. Topics include search advertising and auctions, search and privacy, search ranking, internationalization, anti-spam efforts, local search, peer-to-peer search, and search of blogs and online communities. The Instructor, Dr. Marti Hearst, is an associate professor in the School of Information at UC Berkeley, with an affiliate appointment in the Computer Science Division. The UC...
- published: 26 Jan 2008
- views: 57025
- author: UCBerkeley